D:\Programming\C++\Work\Windows\ConquerMOD\Release\ConquerLoader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
dca71d2f4126cfafc001cb748523e6e2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dca71d2f4126cfafc001cb748523e6e2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dca71d2f4126cfafc001cb748523e6e2_JaffaCakes118
-
Size
565KB
-
MD5
dca71d2f4126cfafc001cb748523e6e2
-
SHA1
2a74c619ac02deffeb00e60fec2d8f2e138d1cca
-
SHA256
1c82f13ab5dbe8b393b8d581828689b378b61e35643a00bb27b4ea3f24551819
-
SHA512
3719ca6c6e954afcb40340e03409e2bb2226ad7180a56ec449acecbc4d60da1a8b13e5a4bbc72aff1f21181f9d9ac11c33f46b998e2356ec0daafdda9ce7ac93
-
SSDEEP
6144:u5qbcwnQT4wD14+az5hLa+FgHE+MthY7/optyyY1a+UizFSmr:usQwn04mK7++FFhYTity3a+UoSmr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dca71d2f4126cfafc001cb748523e6e2_JaffaCakes118
Files
-
dca71d2f4126cfafc001cb748523e6e2_JaffaCakes118.exe windows:5 windows x86 arch:x86
7d90f23b9343b5a15f21470847a67996
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
CreateProcessA
GetLastError
GetProcAddress
VirtualAllocEx
GetModuleHandleA
CloseHandle
VirtualFreeEx
SuspendThread
ResumeThread
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
CreateRemoteThread
WaitForSingleObject
WriteProcessMemory
GetCurrentProcess
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
IsDebuggerPresent
user32
WaitForInputIdle
MessageBoxA
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
ws2_32
WSAStartup
msvcr90
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
sprintf
exit
memset
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 900B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 557KB - Virtual size: 556KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 548B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ